Middleware program with enhanced security

Patent

Rate now

  [ 0.00 ] – not rated yet Voters 0   Comments 0

Details

39518801, G06F 1100

Patent

active

057685037

ABSTRACT:
The authentication and security mechanism in a first program is used to access an application program which requires a different type of authentication and password. A server program runs in the same machine as the application program. The server program communicates with the first program and it is accessed and it authenticates the user utilizing the security and authentication mechanism of the first program. After the user ID of a user who desires access to the second program has been authenticated using the authentication mechanism of the first program, the server program (a) generates a temporary password for the authenticated user I.D., (b) changes the password for the authenticated user ID to the temporary password, (c) accesses the second program using the authenticated ID and the temporary password, and (d) receives data and/or commands from the first program using the security mechanism from the first program and transmits this data and/or commands to the second program and (e) receives data and/or commands from the second program and transmits the data and/or commands to the user using the security mechanism of the first program.

REFERENCES:
patent: 4799153 (1989-01-01), Hann et al.
patent: 5204961 (1993-04-01), Barlow
patent: 5241594 (1993-08-01), Kung
patent: 5339403 (1994-08-01), Parker et al.
patent: 5359721 (1994-10-01), Kempf et al.
patent: 5440744 (1995-08-01), Jacobson et al.
patent: 5497463 (1996-03-01), Stein et al.
McMahon, "Sesame V2 Public Key and Authorisation Extensions to Kerberos", Nwtwork and distributed System Security, Sympsium, IEEE, pp. 114-131, Apr. 1995.
Nueman et al., "Kerberos: An Authentication Service For Computer Networks", IEEE Communications Magazine, vol. 32, Iss. 9, pp. 33-38, Sep. 1994.
Ganesan, "Yaksha: Augmenting Kerberos With Public Key Cryptography", Network and Distributed System security Symposium, IEEE pp. 132-143, Apr. 1995.
Laferriere et al., "Authentication and Authorization Techniques in Distributed Systems", Carnahan Conference on Security Technology, IEEE, pp. 164-170, 1993.
Lunt, "Using Kerberos in Operation Systems", Globecom, IEEE, pp. 687-693, 1991.

LandOfFree

Say what you really think

Search LandOfFree.com for the USA inventors and patents. Rate them and share your experience with other people.

Rating

Middleware program with enhanced security does not yet have a rating. At this time, there are no reviews or comments for this patent.

If you have personal experience with Middleware program with enhanced security, we encourage you to share that experience with our LandOfFree.com community. Your opinion is very important and Middleware program with enhanced security will most certainly appreciate the feedback.

Rate now

     

Profile ID: LFUS-PAI-O-1737178

  Search
All data on this website is collected from public sources. Our data reflects the most accurate information available at the time of publication.